Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/01/2025, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
services.png.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
services.png.exe
Resource
win10v2004-20250129-en
General
-
Target
services.png.exe
-
Size
264KB
-
MD5
d397a1de162f332782fe3205a07792dd
-
SHA1
44793b3a374c3cb453bbd87a2fd28d8a4c408002
-
SHA256
ea251bf7fcc0a42cb9e954a45d925ef379ef1ffca39e482f44af701b4ace8560
-
SHA512
6be10fc6ebabffadd89a72862c5d292e2939d165298019fe684de4efb3284603756c8764810835c12651ad49f608dd3345c8d778b7fd795683f0fcceeaa3f659
-
SSDEEP
6144:VtjNiEZdoTD3wad4eq5OxUatA04d0drsFp2A4AG5uU:VTdS3Uek0WchA2D
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6987227198:AAGW8xEs5eNdfO7EF-8152h-RqJkKbn52BE/sendMessage?chat_id=1075483951
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP\Collection svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MpsSvc\Parameters\PortKeywords\DHCP svchost.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x000300000000b3e2-113.dat family_stormkitty behavioral1/memory/776-270-0x0000000001370000-0x00000000013A0000-memory.dmp family_stormkitty -
Stormkitty family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000300000000b3e2-113.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2992 powershell.exe 896 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file 3 IoCs
flow pid Process 33 2528 ywquammebid.exe 35 2528 ywquammebid.exe 29 2528 ywquammebid.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts smbhost.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2292 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\GoogleUpdateTaskMachineQC\ImagePath = "C:\\ProgramData\\Google\\Chrome\\updater.exe" services.exe -
Stops running service(s) 4 TTPs
-
Executes dropped EXE 5 IoCs
pid Process 2528 ywquammebid.exe 776 UIServices.exe 2820 smbhost.exe 944 SearchUI.exe 1920 updater.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Known Folders API Service.evtx svchost.exe -
Loads dropped DLL 19 IoCs
pid Process 1804 services.png.exe 1804 services.png.exe 1804 services.png.exe 1804 services.png.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 476 services.exe 476 services.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Viati = "C:\\Users\\Admin\\AppData\\Roaming\\Fuyclyizy\\ywquammebid.exe" ywquammebid.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\c02199669cf74979f2f2c3a9189c6864\Admin@KHBTHJFA_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini UIServices.exe File opened for modification C:\Users\Admin\AppData\Local\c02199669cf74979f2f2c3a9189c6864\Admin@KHBTHJFA_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\c02199669cf74979f2f2c3a9189c6864\Admin@KHBTHJFA_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini UIServices.exe File opened for modification C:\Users\Admin\AppData\Local\c02199669cf74979f2f2c3a9189c6864\Admin@KHBTHJFA_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\c02199669cf74979f2f2c3a9189c6864\Admin@KHBTHJFA_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini UIServices.exe File created C:\Users\Admin\AppData\Local\c02199669cf74979f2f2c3a9189c6864\Admin@KHBTHJFA_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini UIServices.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 352 powercfg.exe 1988 powercfg.exe 1980 powercfg.exe 2156 powercfg.exe 2284 powercfg.exe 2780 powercfg.exe 2352 powercfg.exe 2148 powercfg.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe smbhost.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe updater.exe File opened for modification C:\Windows\system32\wbem\Logs\wmiprov.log wmiprvse.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2000 tasklist.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 776 set thread context of 2424 776 UIServices.exe 44 PID 2424 set thread context of 2748 2424 cmd.exe 46 PID 2424 set thread context of 2452 2424 cmd.exe 47 PID 2424 set thread context of 2088 2424 cmd.exe 48 PID 776 set thread context of 1604 776 UIServices.exe 49 PID 1604 set thread context of 1668 1604 cmd.exe 51 PID 1604 set thread context of 2088 1604 cmd.exe 52 PID 2820 set thread context of 1320 2820 smbhost.exe 76 PID 1920 set thread context of 2932 1920 updater.exe 110 PID 1920 set thread context of 2160 1920 updater.exe 114 PID 1920 set thread context of 696 1920 updater.exe 116 -
resource yara_rule behavioral1/files/0x0005000000019f62-1473.dat upx behavioral1/memory/2528-1475-0x0000000003F80000-0x0000000003F8F000-memory.dmp upx behavioral1/memory/2528-1496-0x0000000003F80000-0x0000000003F8F000-memory.dmp upx behavioral1/memory/944-1501-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe File created C:\Windows\wusa.lock wusa.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 264 sc.exe 2568 sc.exe 2936 sc.exe 2560 sc.exe 1704 sc.exe 2760 sc.exe 3016 sc.exe 2804 sc.exe 1576 sc.exe 2648 sc.exe 300 sc.exe 1508 sc.exe 2968 sc.exe 2732 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.png.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ywquammebid.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HOSTNAME.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UIServices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SearchUI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2424 cmd.exe 2452 netsh.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SearchUI.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SearchUI.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString = "Intel(R) Core(TM) i7-8750H CPU @ 5.00 GHz" SearchUI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 UIServices.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier UIServices.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UIServices.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1704 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Privacy UIServices.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" UIServices.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates dialer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs dialer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CTLs dialer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 40d71317c773db01 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT dialer.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ywquammebid.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 ywquammebid.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\1033483A-00000001.eml:OECustomProperty WinMail.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1804 services.png.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 776 UIServices.exe 776 UIServices.exe 776 UIServices.exe 776 UIServices.exe 776 UIServices.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 2820 smbhost.exe 896 powershell.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 2820 smbhost.exe 2528 ywquammebid.exe 2528 ywquammebid.exe 1320 dialer.exe 1320 dialer.exe 2820 smbhost.exe 2820 smbhost.exe 2820 smbhost.exe 1920 updater.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe 1320 dialer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1804 services.png.exe Token: SeSecurityPrivilege 1804 services.png.exe Token: SeSecurityPrivilege 1804 services.png.exe Token: SeSecurityPrivilege 1804 services.png.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe Token: SeSecurityPrivilege 2528 ywquammebid.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 WinMail.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2940 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2940 WinMail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2528 1804 services.png.exe 30 PID 1804 wrote to memory of 2528 1804 services.png.exe 30 PID 1804 wrote to memory of 2528 1804 services.png.exe 30 PID 1804 wrote to memory of 2528 1804 services.png.exe 30 PID 2528 wrote to memory of 1100 2528 ywquammebid.exe 19 PID 2528 wrote to memory of 1100 2528 ywquammebid.exe 19 PID 2528 wrote to memory of 1100 2528 ywquammebid.exe 19 PID 2528 wrote to memory of 1100 2528 ywquammebid.exe 19 PID 2528 wrote to memory of 1100 2528 ywquammebid.exe 19 PID 2528 wrote to memory of 1160 2528 ywquammebid.exe 20 PID 2528 wrote to memory of 1160 2528 ywquammebid.exe 20 PID 2528 wrote to memory of 1160 2528 ywquammebid.exe 20 PID 2528 wrote to memory of 1160 2528 ywquammebid.exe 20 PID 2528 wrote to memory of 1160 2528 ywquammebid.exe 20 PID 2528 wrote to memory of 1188 2528 ywquammebid.exe 21 PID 2528 wrote to memory of 1188 2528 ywquammebid.exe 21 PID 2528 wrote to memory of 1188 2528 ywquammebid.exe 21 PID 2528 wrote to memory of 1188 2528 ywquammebid.exe 21 PID 2528 wrote to memory of 1188 2528 ywquammebid.exe 21 PID 2528 wrote to memory of 1440 2528 ywquammebid.exe 23 PID 2528 wrote to memory of 1440 2528 ywquammebid.exe 23 PID 2528 wrote to memory of 1440 2528 ywquammebid.exe 23 PID 2528 wrote to memory of 1440 2528 ywquammebid.exe 23 PID 2528 wrote to memory of 1440 2528 ywquammebid.exe 23 PID 2528 wrote to memory of 1804 2528 ywquammebid.exe 29 PID 2528 wrote to memory of 1804 2528 ywquammebid.exe 29 PID 2528 wrote to memory of 1804 2528 ywquammebid.exe 29 PID 2528 wrote to memory of 1804 2528 ywquammebid.exe 29 PID 2528 wrote to memory of 1804 2528 ywquammebid.exe 29 PID 2528 wrote to memory of 688 2528 ywquammebid.exe 33 PID 2528 wrote to memory of 688 2528 ywquammebid.exe 33 PID 2528 wrote to memory of 688 2528 ywquammebid.exe 33 PID 2528 wrote to memory of 688 2528 ywquammebid.exe 33 PID 2528 wrote to memory of 688 2528 ywquammebid.exe 33 PID 2528 wrote to memory of 1924 2528 ywquammebid.exe 34 PID 2528 wrote to memory of 1924 2528 ywquammebid.exe 34 PID 2528 wrote to memory of 1924 2528 ywquammebid.exe 34 PID 2528 wrote to memory of 1924 2528 ywquammebid.exe 34 PID 1924 wrote to memory of 788 1924 cmd.exe 36 PID 1924 wrote to memory of 788 1924 cmd.exe 36 PID 1924 wrote to memory of 788 1924 cmd.exe 36 PID 1924 wrote to memory of 788 1924 cmd.exe 36 PID 1924 wrote to memory of 1704 1924 cmd.exe 37 PID 1924 wrote to memory of 1704 1924 cmd.exe 37 PID 1924 wrote to memory of 1704 1924 cmd.exe 37 PID 1924 wrote to memory of 1704 1924 cmd.exe 37 PID 1924 wrote to memory of 2000 1924 cmd.exe 38 PID 1924 wrote to memory of 2000 1924 cmd.exe 38 PID 1924 wrote to memory of 2000 1924 cmd.exe 38 PID 1924 wrote to memory of 2000 1924 cmd.exe 38 PID 1924 wrote to memory of 2292 1924 cmd.exe 39 PID 1924 wrote to memory of 2292 1924 cmd.exe 39 PID 1924 wrote to memory of 2292 1924 cmd.exe 39 PID 1924 wrote to memory of 2292 1924 cmd.exe 39 PID 1924 wrote to memory of 2944 1924 cmd.exe 40 PID 1924 wrote to memory of 2944 1924 cmd.exe 40 PID 1924 wrote to memory of 2944 1924 cmd.exe 40 PID 1924 wrote to memory of 2944 1924 cmd.exe 40 PID 2944 wrote to memory of 2696 2944 net.exe 41 PID 2944 wrote to memory of 2696 2944 net.exe 41 PID 2944 wrote to memory of 2696 2944 net.exe 41 PID 2944 wrote to memory of 2696 2944 net.exe 41 PID 2528 wrote to memory of 776 2528 ywquammebid.exe 42 PID 2528 wrote to memory of 776 2528 ywquammebid.exe 42
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Sets service image path in registry
- Loads dropped DLL
PID:476 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1440
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵
- Drops file in System32 directory
PID:756
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding3⤵
- Checks processor information in registry
PID:664
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}3⤵PID:688
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding3⤵
- NTFS ADS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2940
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
- Modifies security service
- Indicator Removal: Clear Windows Event Logs
PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:812
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1160
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Drops file in Windows directory
PID:848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:964
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:108
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1020
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1060
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"2⤵PID:1712
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1964
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:772
-
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1920 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart3⤵PID:2892
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart4⤵
- Drops file in Windows directory
PID:2592
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc3⤵
- Launches sc.exe
PID:300
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1508
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv3⤵
- Launches sc.exe
PID:3016
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits3⤵
- Launches sc.exe
PID:2732
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc3⤵
- Launches sc.exe
PID:2804
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:352
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:1988
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
PID:1980
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
PID:2156
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:2932
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe3⤵PID:2160
-
-
C:\Windows\system32\dialer.exedialer.exe3⤵
- Modifies data under HKEY_USERS
PID:696
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\services.png.exe"C:\Users\Admin\AppData\Local\Temp\services.png.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Roaming\Fuyclyizy\ywquammebid.exe"C:\Users\Admin\AppData\Roaming\Fuyclyizy\ywquammebid.exe"3⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\HOSTNAME.EXEhostname5⤵
- System Location Discovery: System Language Discovery
PID:788
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1704
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2000
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\net.exenet share5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 share6⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpb87cf536\UIServices.exe"C:\Users\Admin\AppData\Local\Temp\tmpb87cf536\UIServices.exe"4⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2424 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2452
-
-
C:\Windows\SysWOW64\findstr.exefindstr All6⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp5fc2b8f4\smbhost.exe"C:\Users\Admin\AppData\Local\Temp\tmp5fc2b8f4\smbhost.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:880
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵
- Drops file in Windows directory
PID:2356
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:1704
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:2568
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:1576
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:2936
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Power Settings
PID:2284
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Power Settings
PID:2780
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Power Settings
PID:2352
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Power Settings
PID:2148
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"5⤵
- Launches sc.exe
PID:2968
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"5⤵
- Launches sc.exe
PID:2648
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:2560
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"5⤵
- Launches sc.exe
PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\tmp5fc2b8f4\smbhost.exe"5⤵PID:1120
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 36⤵PID:1616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp6c8703be\SearchUI.exe"C:\Users\Admin\AppData\Local\Temp\tmp6c8703be\SearchUI.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:944
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "841215402-1103076719-1868372208771985712-81307184817887245751619752628-1252520816"1⤵PID:2340
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "75873672-6539417034278052941440520146-662840111-1459161173-1290124517983263807"1⤵PID:2608
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "9611305661503684569-10721818251571207513-1902898541-1814588456-1216617637-1220528118"1⤵PID:2616
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-3125071951157382596682322215-1547760031343793608-7319317141517674496-530040815"1⤵PID:2804
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-18527479759104999451011739969-483625001232579143-158765822142400735-673802402"1⤵PID:2744
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1821721023112856662-545537562-1357626704-20138830358206235575396965981668603836"1⤵PID:2724
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-202554393809173408-1003446540-7858277352034527774-829233011824694957-1680441723"1⤵PID:1276
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-15043945951835073613-579452866511167771420233137129170366110595858012015676139"1⤵PID:2588
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-18010193791897038160-7767670302085802001-350807489-1802522166-2087375314-381818314"1⤵PID:2360
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "565086969-1841902522325075000-18577559141098821092-1218529199-1028514191561591007"1⤵PID:1536
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "421798447749941276-1241432036-13884893352113730328-1399743508-18523868831071296075"1⤵PID:2252
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-16497283646094901691567157748-1409937679-1521983310-7004962871155756101-571068448"1⤵PID:2744
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-57917438515821474931566373543-322396246-1994307536-1562736092460152119-2006217143"1⤵PID:264
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-18960617021065031053-1657401835-6689972981185618850142660905520009419721219443539"1⤵PID:1648
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1370914616-2091968517-2077985400188783117018157134062026827130-6874543031835970897"1⤵PID:1764
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-295124016-65843619778807711-743772807834374048-10592273221340712453109003069"1⤵PID:2208
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "437649168487831885-193196024672738775517294502952001609576-917905604-84141426"1⤵PID:1328
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Discovery
Browser Information Discovery
1Network Share Discovery
1Process Discovery
1Query Registry
2System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5f4f839b52717e0e2f28e846fd7cdb580
SHA184ad957a78a510a582e5951af350da46f19a21a6
SHA25659d13e519f495223e28ca1509ea40f66f62aad728cc538848e11983a1732e69d
SHA512b6854ae8794a73e5da379839d55cedcda2ea6042efbad6066dd568df4ccdca177623cd6610504dae3807119defa9c950607c72eeb7a88bed96ab4602c0088408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d514e3928230022d45ac872280750d61
SHA1391019838489e3c79e6fd89554d67847999ffa10
SHA256c44df55f90a6a53f2b4a17f01c5dea7c5371c4e11476efc2dfe5d29999010800
SHA512d552c9a13fcc354210adef25a9480284c99fcec1f40564779d79d7d7b1b5973e8a14d09bf70124eff4562d52463270d71bd3e3b922074735217075f205bfbe06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735
Filesize232B
MD5cf79bd5a432d8bde76e73a5d9cb314c9
SHA19753d7b616ef8adf1f5d3f955f3aa1cd336a7536
SHA256c80e3045a52b070f32d5b1e0d0444a4de983baa9aea050bb0afb468c985f7310
SHA512f5d078c730746d0645f3d503f88a22d99a546bf8f19b900f96a05a1a1c1dc19745b5ad2a06107eff86a2a5d5352d4f1d6b1f0a16e19da0f3185eb6fd30e60065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a281b3bbb00c1f9790f3fdf402b3efe8
SHA1e529ae50a515f7e4b0e52e0a5eb4e34ab8984cc6
SHA256138268a1c056cb948f4be1906c6b9fae8ed0ff52c124d6df1dd0454b4b8c096e
SHA51220f46db2459c63b9fa27325ed36d9636895f3a2ff9e8cd33e332680a13b2a5314310a09f2e6c1e3a6e5aa0e61fb51bb608eb40addcfe16a7f1a1e3e99e7ff638
-
Filesize
2.0MB
MD5ad9100855b7d2d1694b80f533e565373
SHA184b826ebfaca0ad8dcbed5c873fe4d2370ba38b9
SHA2565ef23b00f5b26c34bd0375c20fcfcc6ee7063f53233e11e8415891d6ba5b338e
SHA512488122a7e32ee047ba88cf63a5f22451a60ee3aa5085987e2fd134754ea5fd03ec2068c40d9cdea4b4b1d9ae61d418b179a26f640e42d4231387c18ae2d0b639
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
606KB
MD55814939ad656cb2e0caff89fd92e5561
SHA13b15ed3948598c11f3a678eb9a983c0b17c81f78
SHA25601cf39d8c61aa262026452578fc603ad71e6ad1cfe3878001bea4dcc67cd1a15
SHA512463263b79cc97530502ef0aec27eca33bb948fc6190ebeb0e6462b0b6bfcb08c0b8fa3012310b65b6a3e9d7fe842788ed25f13b307ce22c54ed0cd356699759a
-
Filesize
8KB
MD5d072fc543eeaaf75a55559291b71e3bb
SHA1353816e4aa68de14016520e2ccf5bcc301afed6a
SHA2565f3be60c58328496b07b6b0e08f8d2b85edc16f8d9102c8317dca5229b7a99a1
SHA51275682013330391135a2abdeb6c56f5f46d445ab54d33ff1c2c3b6286bd11cda8e2fe39cc6d48766b794f57831caad173f101f88fde827b645df35be59e733df0
-
Filesize
13KB
MD57183d74762863a09565bfc07fd130c46
SHA112b95541f8222ae8cacbae369ee6fd8a23a4f37a
SHA256c8058aa9f71a3a5a2537ae0c93a7248a296d72a0eb2906437477330efbb5b6d5
SHA512c9d04b9a253dac6c96b59cc5d607a878798f1798971998ac7210689d9e0ee57db43866478c8ac3f26af369d74d0778056bfec1467e1023909129066aba2a696e
-
Filesize
3KB
MD57f00c36bf9255f977c67b852ba5dcd53
SHA1f3503bdb5d5a580ffa8f9dd83e35c204a5f5c149
SHA256167986dfdf7d2e14742a08afdad0cb4eb2a15ed85735133a122ff0ae302b86de
SHA5126fe4fe7e74148959aa0da55e49b96780bdd1efafd196759faa9d5af4f127ed46834cb9f1fbdd5ac35cefedb19310e428079e2b8c788cb8e3efac8a99aa6f0fd2
-
Filesize
5.3MB
MD5b7c617a44000e6e30462ffdd5a27ba4f
SHA1dffbd2089913059c730f751c9349d98dbc5e4f3f
SHA256f2b0f9d4f4109891d7a92f3c9e22c0fb748d36bf564eebf74a0055056e307b45
SHA51274fbc1b3ebd412c501b787974a0a7b597934accfb2eb2f47ae697bbb93db2de6824ae4cae3cb2b0783b592b4337d3eebce1a4748201653a143d326a238612181
-
Filesize
17KB
MD5d72791d9eb757581772716a7573c4a4c
SHA18fa5d920023a9ff0b5329fd605d4b176783cc32d
SHA256b87870c36a1c770960979d8958aeb12c0537b5287bd420555931e6f4a28bbebf
SHA512b9a6c55c9fdc85e63e7228dfe260993f45cb492bbca6c90beb2c9e9f31e54406d7774292a4c19b7b12514d688bec41cf19c60a75ce16703158bf0edac3013563
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94
-
Filesize
170KB
MD54376ea4b5ba0f8a061dc18342267e85c
SHA18d99fa9673835644c641ae4533f005dca4522f6c
SHA2566508dd74c69d399050b07256b4b25cd66cfd774848d55fe330a9d77ad09ce03f
SHA51224811d6dd05df0000b5d0948a833c49ef32a7e5fc3a5cab6c61e9331b6966026f03254eb1a8a9945e8a4e43d1e38bdebed2ec0e8337873de3386c4c4b5bde0a6
-
Filesize
264KB
MD527cdfefc0b71da0030d940fe60b69532
SHA105a4203d3575549a497b3c7a5ad1c6c57eadb949
SHA25646e234ab12a92b8bc3da447995d23fe20d04d4499446aa3b007ba342dcbef450
SHA512f99cee8eb1658f6dcd6747fdbd19d93cfb19320afeb3b982fa6a0d47f39ba31c54671de8555534cec4f3f492cb62b01488b8d76037df131b9ecdd293026e310b